More than 30 routers are susceptible to this latest vulnerability, which exposes the passwords used to log in to routers from NETGEAR’s web portal. In order for cybercriminals to exploit the flaw, the password recovery feature must be disabled. The password recovery feature allows users to recover their passwords if they forgot them. This process requires users to answer two security questions. When this feature is enabled, hackers cannot get a router’s password because they will not be able to correctly answer the two questions.

Cybercriminals can attack a vulnerable NETGEAR router through the local network. They can also attack the router remotely if the device’s remote management feature is enabled. Once the hackers gain control of a router, they can change its configuration, make it part of a botnet, or have it perform another type of malicious act.

NETGEAR’s Web GUI Password Recovery and Exposure Security Vulnerability web page lists the routers that contain the flaw. Firmware updates that patch this vulnerability are available for many of the routers. However, updates are not being released for older routers. NETGEAR has provided a workaround that will prevent hackers from exploiting the flaw in these older devices.

Although most of the affected devices are classified as home routers, it is not uncommon for small businesses to use consumer-grade routers. If you think your business might be using one of them, contact us. We can check to see whether your router is affected by this vulnerability and apply the appropriate update if necessary.

About

Tech Squared

Hi, we're Tech Squared! We have been in the IT industry for the past 15 years and have decided to pass some of our knowledge on to you. Our goal as a company is to help transform business technology from a "necessary evil" to an advanced asset for increasing productivity and growth!